Threat Intelligence Spotlight: Stealth C2 Activity Disguised as Gambling Traffic: What Every Security Leader Should Know

Executive Summary What appears benign can often be dangerous especially in today’s evolving threat landscape. During a recent incident response engagement, our analysts uncovered a stealthy malware campaign operating under the radar. The malicious activity involved encrypted command-and-control (C2) communication…